CVE-2023-35042
12.06.2023, 15:15
GeoServer 2, in some configurations, allows remote attackers to execute arbitrary code via java.lang.Runtime.getRuntime().exec in wps:LiteralData within a wps:Execute request, as exploited in the wild in June 2023. NOTE: the vendor states that they are unable to reproduce this in any version.Enginsight
Vendor | Product | Version |
---|---|---|
geoserver | geoserver | 2.0.0 ≤ |
𝑥
= Vulnerable software versions